Depending on how you have your SAV infrastructure configured, you can get away with installing the agents just on the primary servers, however the data received is better if you install the agent on each parent too.

That will get the basics. However each Primary AV server (and ideally)
each AV server needs to have the reporting AGENTS install and configured to
report to the Reporting server. To configure the agents you need the 10.1
Symantec Center Console.

I am running Reporting server without any problem on version 10, and 9
servers. The agent installs and reports back to the reporting server. You
may need a special group with 10.1 for the reporting server only, but the
reporting will work with the lower version AV servers ( agent will not
install o

We have seen customers use many ways to get information out of our log files, I've seen some quite useful information extracted using Microsofts Log Parser tool. (and could possibly get hold of some scripts)

Thanks but we don't have version 10.1 and unfortunately, I have to find a
way to report with the versions we have. I may suggest to upgrade but that
will not be possible now - IT Ops folks and other IS Managers will be
difficult to convince - given the heavy IT Governance and change

The Focus-Apple mailing list discusses security involving hardware and software
produced by Apple or that runs on Apple platforms. Discussion may include
security assessment, planning, and implementation for Apple technologies. This
list is meant as an aid to network and systems admin

Ringo absolutely sends invitations to your entire address book without your knowledge or consent. Got an "invitation" from my sister (it was actually an invite to "view her latest photo's online", she didn't send the invite and had just gotten the same email from one of her friends. I didn't sign

Based on the feedback I've received here, I'll contact the test labs,
and for show and tell purposes, consider a mobile malware lab. However
I'll use two computers back-to-back, since I'm testing browser
protection. I have to determine what malware I can't carry around in
c

Have you considered third party testing? ForeScout had the same problem
with customers so they engaged ITSLabs.com to perform an independent
validation test. ITSLabs used both real worms and a custom developed
unknown "zero day" worm to demonstrate ForeScout's ability to contain
the multipl